How can a file be malicious?

This page summarizes the projects mentioned and recommended in the original post on /r/hacking

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
  • setoolkit

    The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

  • There's programs out there to make these malicious PDFs, word documents, etc https://github.com/trustedsec/social-engineer-toolkit

  • soundhax

    Free 3DS Primary Entrypoint <= 11.3

  • it's not mp3, but i do remember one semi-recent audio file vulnerability: "Soundhax" for the Nintendo 3DS music player app. It uses a classic memcpy overflow to put arbitrary data from the sound file tags to the heap and then then goes from there.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts